×
 
 Back to all events

Building Quantum-Resilient Systems: A Practical Approach

 

Feb 17 2025, Monday06:30 PM - 08:00 PM (GMT +8:00) Kuala Lumpur, Singapore

 

32 Carpenter Street, 059911

0%

Overview

It is said that quantum computers will undermine the cryptographic controls that protect our privacy, secure our intellectual property, and confirm our identity to business partners and service providers. Huge amounts of research has been carried out to identify new controls that can take the place of algorithms that are vulnerable to attack by quantum computers, and more still has been carried out to find ways of bringing cryptographically-relevant quantum computers closer to reality.

But the complexity of marrying up developments in quantum physics to security objectives has left many wondering how real the risk is, and how to make the argument that this is a problem that requires investment. Worse still, the activities by large software vendors have encouraged some to lean back and wait for their supply chain to manage the issue for them. In this event we aim to explain the risk in practical terms, identify what issues need active management by engineers and IT departments alike, and explore some of the practical challenges associated with moving towards so called “quantum-safe” technologies.  

Cambridge Consultants is happy to to explore Quantum-Resilient Systems with our own domain expert, Bob Oates. Attendees will be provided with pragmatic, evidence-based advice on how to secure their systems against the threat posed by quantum computers.

Agenda:

18:00 Doors open 

18:30 Post Quantum Security by Bob Oates, Head of Cybersecurity Assurance, Cambridge Consultants 

18:50 Q&A 

19:10 Networking session 

20:00 End of event 

Supporting Image

Schedule

Date: 17 Feb 2025, Monday
Time: 6:30 PM - 8:00 PM (GMT +8:00) Kuala Lumpur, Singapore
Location: 32 Carpenter Street, 059911

Speakers

Speaker's Profile:

Bob Oates, Head of Cybersecurity Assurance, Cambridge Consultants
Bob Oates

Bob is a specialist in the interaction between safety and security for operational technology, critical infrastructure, and IoT devices. His responsibilities include: embedding cyber risk management into the engineering process; generating the cyber assurance argument for internal stakeholders, accreditors, and customers; identifying security controls that are compatible with safety critical architectures; forming a link between engineering and IT security to maximise reuse of technology, processes, and services.

Technology:
Industries: